General
-
Target
a73fc47c50c84406079ec3a83b8dcd31934454a7cf2adc8acb59f0715777584c
-
Size
3.0MB
-
Sample
241225-bgen1sspfy
-
MD5
f5b2baebfafef93996f2e92b8a11c5c7
-
SHA1
a5c9ec23cca023f2739615034742854e8c45118e
-
SHA256
a73fc47c50c84406079ec3a83b8dcd31934454a7cf2adc8acb59f0715777584c
-
SHA512
88186903bc517e4903231c9e293cc954338f25612c20aee2c2a923825147c7ef4250a218cb7341f551ae753992bbdf4dae0c2f75b44985135072bdb2bddfe8a5
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
a73fc47c50c84406079ec3a83b8dcd31934454a7cf2adc8acb59f0715777584c.exe
Resource
win7-20241010-en
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:10903
sudo_y1c6316rzc907rq53f3s5mvbsl5wem5z
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\dleserverdle\BLtools2.1.9V.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
a73fc47c50c84406079ec3a83b8dcd31934454a7cf2adc8acb59f0715777584c
-
Size
3.0MB
-
MD5
f5b2baebfafef93996f2e92b8a11c5c7
-
SHA1
a5c9ec23cca023f2739615034742854e8c45118e
-
SHA256
a73fc47c50c84406079ec3a83b8dcd31934454a7cf2adc8acb59f0715777584c
-
SHA512
88186903bc517e4903231c9e293cc954338f25612c20aee2c2a923825147c7ef4250a218cb7341f551ae753992bbdf4dae0c2f75b44985135072bdb2bddfe8a5
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-